


default search action
BibTeX records: Jan-Ole Malchow
@inproceedings{DBLP:conf/acsac/WieseWM018,
author = {Oliver Wiese and
Christoph Weinhold and
Jan{-}Ole Malchow and
Volker Roth},
title = {I Need this Back, Later!: An Exploration of Practical Secret Sharing},
booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference,
{ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
pages = {478--489},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3274694.3274729},
doi = {10.1145/3274694.3274729},
timestamp = {Wed, 05 Dec 2018 09:44:25 +0100},
biburl = {https://dblp.org/rec/conf/acsac/WieseWM018.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/NiedermaierMFMM18,
author = {Matthias Niedermaier and
Jan{-}Ole Malchow and
Florian Fischer and
Daniel Marzin and
Dominik Merli and
Volker Roth and
Alexander von Bodisco},
editor = {Christian Rossow and
Yves Younan},
title = {You Snooze, You Lose: Measuring {PLC} Cycle Times under Attacks},
booktitle = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore,
MD, USA, August 13-14, 2018},
publisher = {{USENIX} Association},
year = {2018},
url = {https://www.usenix.org/conference/woot18/presentation/niedermaier},
timestamp = {Mon, 01 Feb 2021 08:41:54 +0100},
biburl = {https://dblp.org/rec/conf/woot/NiedermaierMFMM18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-00933,
author = {Jan{-}Ole Malchow and
Benjamin G{\"{u}}ldenring and
Volker Roth},
title = {New Directions for Trust in the Certificate Authority Ecosystem},
journal = {CoRR},
volume = {abs/1801.00933},
year = {2018},
url = {http://arxiv.org/abs/1801.00933},
eprinttype = {arXiv},
eprint = {1801.00933},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1801-00933.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MalchowG016,
author = {Jan{-}Ole Malchow and
Benjamin G{\"{u}}ldenring and
Volker Roth},
editor = {Edgar R. Weippl and
Stefan Katzenbeisser and
Christopher Kruegel and
Andrew C. Myers and
Shai Halevi},
title = {{POSTER:} Re-Thinking Risks and Rewards for Trusted Third Parties},
booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
Communications Security, Vienna, Austria, October 24-28, 2016},
pages = {1796--1798},
publisher = {{ACM}},
year = {2016},
url = {https://doi.org/10.1145/2976749.2989060},
doi = {10.1145/2976749.2989060},
timestamp = {Tue, 10 Nov 2020 20:00:49 +0100},
biburl = {https://dblp.org/rec/conf/ccs/MalchowG016.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MalchowMKKR15,
author = {Jan{-}Ole Malchow and
Daniel Marzin and
Johannes Klick and
Robert Kovacs and
Volker Roth},
title = {{PLC} Guard: {A} practical defense against attacks on cyber-physical
systems},
booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
2015, Florence, Italy, September 28-30, 2015},
pages = {326--334},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/CNS.2015.7346843},
doi = {10.1109/CNS.2015.7346843},
timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
biburl = {https://dblp.org/rec/conf/cns/MalchowMKKR15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KlickLMMR15,
author = {Johannes Klick and
Stephan Lau and
Daniel Marzin and
Jan{-}Ole Malchow and
Volker Roth},
title = {Internet-facing PLCs as a network backdoor},
booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
2015, Florence, Italy, September 28-30, 2015},
pages = {524--532},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/CNS.2015.7346865},
doi = {10.1109/CNS.2015.7346865},
timestamp = {Wed, 24 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cns/KlickLMMR15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MalchowR15,
author = {Jan{-}Ole Malchow and
Volker Roth},
title = {CryptID - distributed identity management infrastructure},
booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
2015, Florence, Italy, September 28-30, 2015},
pages = {735--736},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/CNS.2015.7346910},
doi = {10.1109/CNS.2015.7346910},
timestamp = {Wed, 24 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cns/MalchowR15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID













